Subscribe Twitter Twitter

Monday, October 25, 2010

Network Technical Requirement

Network Technical Requirement

Network Protocols
Protocols are the rules by which network operate. They set the standards for error detection, control sequence, message lengths, media access and so on. All networks must use a protocol and, in general, the protocol must be common to all nodes on the network. The following paragraphs offer a quick review of three of the major protocols in use today, NetBEUI, IPX/SPX and TCP/IP.

NETBEUI
NEtBEUI (NetBIOS extended user interface) is an enhanced version of the NetBIOS(network basic input/output system) protocol and was developed when computer networking primarily meant local area networking for a relatively small number of computers,from two computers to about 200. It was not developed to take into account enterprise networks where frames are directed from one network to another through routing and routers. For this reason, NetBEUI is well suited for small local area networks(LANs).

IPX/SPX
IPX/SPX (Internet packet exchange/sequenced packet exchange) is the protocol stack (several layers of software that define the protocol)used primarily by Novell Netware. One advantage it has over NetBEUI is that it has routing capabilities, so data can be transported over multiple networks. A companion protocol is SPX which enables the exchange of application specific data with greater reliability than IPX.
TCP/IP
TCP/IP (transmission control protocol/Internet protocol) is a protocol stack and is the communications protocol used on the Internet. If your LAN will be connected to the Internet you will need to enable TCP/IP protocol. Before setting up TCP/IP, you will need to make a decision about how to set up IP addressing on the network. The options are to use either static addressing or dynamic addressing.. Static addressing involves assigning a unique IP address to each workstation permanently. Dynamisc addressing automatically assigns an IP address to s computer each time it is logged on: this method is called dynamic host configuration protocol (DHCP).TCP/IP is well suited to medium to large networks. It is designed for routing, is highly reliable and offers better security than NetBEUI. The size of the protocol suite is large and hence its implementation on MS-DOS machines is difficult, especially the older ones. The other disadvantage is the slow speed of the protocol because of high implementation overheads.

Network hardware
When we refer to network hardware we are talking about a range of electronic devices that can be interconnected in such a way as to allow the transmission of communication signals between a number of workstations. These devices range from simple generic hubs to sophisticated proprietary hardware such as routers and gateways. To help gain a better understanding of how these devices interact with each other you need a knowledge of what devices are available and how they work.
The following represents some of the more commonly used network hardware components.
Network interface cards
Network interface cards(NICs) are the most common type of network hardware on a network. Every workstation and server will contain at least one NIC. NICs contain the electronic components that establish and control network communications. The NIC is the principle hardware device that differentiates between a networked computer and a stand –alone computer.
Transmission media
The transmission media or cables are the most important component of a network; after all, it is the cables that provide the physical connections between the workstations and that server. There are several different types of cable that can be used in networking and, although many networksuse a particular cable type exclusively, increasingly more and more networks are using a combination of different cable types. The choice of cable for your network needs to be considered carefully, as different cable s not only transmit at different speeds but also have different distance limitations. The two most common cable types used in modern networks are coaxial cable and twisted pair.
Hubs
Hubs are one of the most basic pieces of networking equipment available. Physically a hub is a box with a number of RJ45 ports(typically between 4 and 32) that allows you to connect several networking devices together using twisted pair (CAT 5) network cables.

Routers, switches and bridges

Switches look nearly identical to hubs, but a switch generally contains more intelligence than a hub. Unlike hubs,network switches are cable of inspecting the data packets as they are received, determining the source and destination device of tht packet, and forwarding that packet appropriately. By delivering messages only to connected device that it was intended for,network switches concerve network band width and offer generally better performance than hubs. Most switches are active: that is, they electrically amplify the signal as it moves from one device to another.
Bridges are devices that allow you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to- date, a bridge can connect the two.
Routers translate information from one network to another; it is similar toa bridge with extra intelligence. Routers select the best path to route a message, based on the destination address and origin. The router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along back roads and shortcuts.

Friday, October 22, 2010

Microsoft to open online PC game store

Microsoft to open online PC game store<br />
Microsoft plans to open a new online PC game store called Games for Windows Marketplace in the middle of November, it said Monday.

Microsoft will ready over 100 titles from various game makers for the launch, including many of the biggest hits from Microsoft Game Studios, including "Fable: The Lost Chapters," "Flight Simulator," "Gears of War," "Halo" and "Age of Empires Online." Other big titles in stock include "Grand Theft Auto III," and "Max Payne" from Rockstar Games and "Deus Ex: Game of the Year Edition" from Square Enix. The site will also host indie game titles, Microsoft said.

PC game lovers will be able to access the store at any time to buy games or to download them again if necessary, Microsoft said. Special deals will be used to lure gamers to the site, such as weekly and seasonal deals.

"The Games for Windows Marketplace will offer PC gamers a robust lineup of games they love, easier navigation and purchase, and recurring specials such as Deal of the Week," Microsoft said.

It will launch Nov. 15 at www.gamesforwindows.com.

Anyone with a Windows Live ID, including Windows Live, Xbox Live, Games for Windows -- Live or Zune account, can login to the new Games for Windows Marketplace. Microsoft Points can also be used at the store.

Wednesday, October 6, 2010

Information System in Organisation

Information System in Organisation
The business problem

Information technology plays an important part in any organisation.Information technology
provides information systems that help people within the organisation do their particular tasks.
User requirements and technology are constantly changing. New or updated systems need to be introduced.
When any service is to be provided, the needs of the client should be determined before that service is provided.
If you do not know what the client requires,how can you be sure the client's needs are being satisfied?
In this unit you will look at how to determine client requirements.Different techniques to help you will be discussed.


Organisations and Information Systems

An organisation is a group of people all working towards a comman goal.This is a very general description that covers
a great numbers of groups.Indeed, it is difficult to think of any group of people that is not an
organisation.one example is a group of people who are competing in some way,such as a group of athlets in a race.That group
of athletes in a race. That group of athletes is not an organisation.Working towards a comman goal,or number of goals,is an important
goal,or number of goals,is an important characteristic of an organisation.
Organisations can be characterised by:
size, Industry and ownership.
Organisations range in size from one person to many thousands of people.We often use the terms 'small' and 'large' organisation.This
distinction is quite arbitary. Some say an organisation of up fifty people is small, others say a hundred.

Industry
Organisations can be categorised by the type of industry they are involved with. usually, there are many organisations within an industry.
Ownership
Organisations can be categorised by their ownership of the organisation may be private,government or social.
Individuals own organisations in the private sector.
Information Systems:
Every type of organisation has requirement for information system.An information system can be describe as a set of resources that work together
to process data into meaningful information that the organisation can in its business.
Resources are numerous,including people.Information technology resources include computer hardware
9for e.g cpu,monitor,keyboard),communication infrastructure(for exmple networks) and software.Information technologyis very technology is
veryintegrated allowing people to exhange information within an organisation( for example,by an internet) for externally
(for example,images,graphs)or non graphical.

Information systems are an important part of an organisation. Now we will consider the people
who use these information systems. These people are known as users. Users may interact
with the system directly,for example,by entering data or reading information on a screen users
Users may interact with the system directly, for example,by entering dat on reading information
on a screen users may also interact indirectly by reciving a computer generated reports.
There are various types of users. They include:
Operational staff
managers
customers
shareholders
general public

Operational staff: The operational staff are the workers. They actually use the information system
to help them do their business.
Managers: Middle managers, or line managers, manage the operational part of the business.They
supervise staff and the operations,make decision and provide leadership at the level.
Information systems help them perform those tasks.
Customers:
Customers do not work for the organisation,but do have interaction with the organisation's
computer systems.They can be indirect users,such as a person who receives an invoice from
a computerised invoicing system.The advent of the internet and e-commerce system has greatly
increased the direct interaction of users with organisation's computer systems. Customers are an
important consideration in determining information system requirements.

Shareholders
Shareholders are owners of organisations but do not take part in the day-to- day running of the organisation.By purchasing in
the organisation. By purchasing shares in the organisation,shareholders receive part of the profits. They also gain the right to
elect members to the board.They become indirect users of the organisation's information systems.The organisation must fully inform the sharehold-
ers of its performance.
Information Systems are very important in providing accurate and relevant information to shareholders. The legal
consequences of incorrect reporting to shareholders can be quite severe.
General public:
Increasingly, the general public is being exposed to information systems.This is particularly
the case with computerised information system. People actually use organisations' information
systems.There is no better example of this than the Internet.Many organisations are providing
information about their services on the Internet.Many organisations are providing information
about their services on the Internet.

Information System s provided by computers are a very important of an organisations need effective
computer systems to do their business and cannot survive witout them.Users interact with information
systems in different ways-for example ,operational staff and customers interact in order to do business
and customers interact in order to do business, and managers interact to make decisions.
Information systems can be quite complex.care must be taken in determining what users want from information systems. Techniques such as interviewing
and questionnaries are used to collect information requirements, which are then documented
and presented to the client for approval.

Monday, October 4, 2010

Technical Documentation

Technical Documentation
Internet/Intranet
The Internet has become a rich source of information, including computing
systems documentation. Information about all types of hardware and
software can be found. Some information comes from the suppliers,
although much of it is from other parties.
Documentation is often found on an organisation’s intranet. For example,
the Intel website (www.intel.com) provides technical specifications of hardware
components.
Help files
Help files are common in many applications, reflecting the increasing
popularity of online documentation. Help files often provide detailed and
structured information so that the user can find what they want without the
inconvenience of a bulky manual.
Help files can now be produced in HTML format using Microsoft’s HTML
Help. These help files can be viewed by Internet browsers such as Internet
Explorer and Netscape.
Multimedia
Text, graphics, video, animation, sound and interactivity can be integrated
into online documentation – this is known as multimedia documentation
because it uses a range of communication media. Information can also be
organised as a database – this allows selected information to be retrieved
quickly and accurately, making online media dynamic and powerful.
CD/DVD
Large volumes of information can be stored on CD or DVD. This is now the
cheapest and most flexible way of providing documentation.

The purpose of technical documentation is to provide information for people
who build and maintain computer systems. Computer engineers and
technicians, network engineers and administrators, systems analysts, system
designers, data analysts, programmers, technical/manual writers
(documentation specialists) and software testers need to know how a system
works, although different people are interested in different aspects of
the system. Figure 1.3 shows a computer technician referring to some documentation
while fixing a computer.
A data analyst in charge of a corporate
database might only be interested in
knowing about the data used by the
system. Clearly there should be a
description of the data used – in this
case, in a data dictionary. A programmer,
on the other hand, is more
interested in the logic of a program – if
a program is malfunctioning. In this
case the information will be found in a
program specification, which may be
textual, diagrammatic or both. A user
manual such as a training document
requires information such as screen
and report layouts, which are provided
in the technical documentation. For
example, a writer may want to develop a sales brochure, and so refers to the
technical documentation for information about the product. A software tester
may need samples of typical data to be used with the application in order to test
the software effectively. A network engineer may need technical documentation
to set up a network.
Other people who may need to refer to the documentation include project
managers, system managers and computer operations staff.
Methodologies for producing documentation
A methodology describes the approach and the steps used in a particular discipline.
For example, accountants have methodologies for preparing
financial reports, software developers have methodologies to prepare software,
and technical writers have methodologies for preparing
documentation.
A widely accepted methodology for developing computer system documentation
is the standard documentation process. The starting point in this
process is the document library blueprint – this is a description of the
different types of documentation required (such as training manual,
procedure manual, online help). It is a specification of the documentation
to be produced.
The document library blueprint is used to obtain user acceptance and project
management approval for the form, style and purpose of the
documentation. It also serves as a planning aid in development.
Individual document blueprints are specified after the document library
blueprint has been approved. These individual specifications are more than
an outline. They identify the context of the document, its purpose and the
detailed content. Figure 1.4 shows the stages and their sequence in the
standard documentation process.
The development of the documentation is a project in itself, and so good
project management methods are needed. The development of computer
system documentation has its own life cycle. As shown in figure 1.4, the
stages that make up the development process are:
planning
drafting
reviewing
testing
producing
distributing
updating.
Planning
As in other disciplines such as constructing a building or developing software,
planning is essential. Just as a builder
would not start building a house without a
schedule, specification and budget, you should
not start writing the documentation without planning first. As part of the
planning process, you need to:
create a document library blueprint
determine the resources required
develop a schedule
determine the budget.

Creating a document library blueprint
Creating the document library blueprint involves identifying all the pieces of
documentation and how they are related, and developing a specification for
each – known as the document specification. The document library blueprint
and specifications provide the information the authors need to produce the
documentation.
The individual document specification covers the document’s:
purpose
audience
— characteristics
— needs
— diversity
related documents
media
production plan
reviewing and testing
update plan.
These should be specified to a level of detail that will enable a documentation
developer to produce the documentation. They should be sufficiently
clear and detailed for another person to use them.
Purpose
The purpose of the document is to define the reason why this documentation
is produced. This may be addressed in the form of objectives for the documentation.
The following are some examples of technical documentation
objectives:
to enable a person to assemble a computer
to enable a software engineer to change software
to help a database administrator to manage a database
to assist a computer technician to repair a computer.
Intended reader
The intended reader or user must be identified. Their background and any
other relevant factors related to their use of the computer system must be
stated. Factors such as language, culture, attitudes and environment may be
important. The characteristics of the reader are often described in the final
documentation. Figure 1.5 shows a description of the reader given in the
introduction of the banking ma

Sunday, October 3, 2010

Hub, Router and Switch


A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple: anything that comes in one port is sent out to the others. That's it. Every computer connected to the hub "sees" everything that every other computer on the hub sees. The hub itself is blissfully ignorant of the data being transmitted. For years, simple hubs have been quick and easy ways to connect computers in small networks.

A switch does essentially what a hub does but more efficiently. By paying attention to the traffic that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic from machine A coming in on port 2, it now knows that machine A is connected to that port and that traffic to machine A needs to only be sent to that port and not any of the others. The net result of using a switch over a hub is that most of the network traffic only goes where it needs to rather than to every port. On busy networks this can make the network significantly faster.


A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes from the small four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. A simple way to think of a router is as a computer that can be programmed to understand, possibly manipulate, and route the data its being asked to handle. For example, broadband routers include the ability to "hide" computers behind a type of firewall which involves slightly modifying the packets of network traffic as they traverse the device. All routers include some kind of user interface for configuring how the router will treat traffic. The really large routers include the equivalent of a full-blown programming language to describe how they should operate as well as the ability to communicate with other routers to describe or determine the best way to get network traffic from point A to point B.

In computer networking, topology refers to the layout of connected devices. This article introduces the standard topologies of networking.

Topology in Network Design

Think of a topology as a network's virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there.

Network topologies are categorized into the following basic types:

  • bus
  • ring
  • star
  • tree
  • mesh
More complex networks can be built as hybrids of two or more of the above basic topologies.

Bus Topology

Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message.

Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.

Illustration - Bus Topology Diagram

Ring Topology

In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network.

To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.

Star Topology

Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.

Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)

Tree Topology

Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.

Mesh Topology

Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.

A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.

Summary
Topologies remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design, but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes.

Thursday, September 30, 2010

Medical Records on Your Cell Phone Computer Scientists Turn Cell Phones into Health Care Resource


New software technology allows cell phone and PDA users to download their medical records, making them quickly accessible in case of emergency. The new software, to be available in a year, can even display animated 3D scans. Computer scientists say the technology will also enable students to do research using their portable devices.

SAN DIEGO--Imagine if your medical records were lost or misplaced. It can cause more than aggravation; it could impact the care you receive. Now, imagine being able to download your own health records -- even X-rays and diagnostic scans -- right into your cell phone or PDA.

The same technology that brings games to life in your cell phone can also help you and your doctor keep track of your health. Gregory Quinn, a computer scientist at the San Diego Supercomputer Center at the University of California, San Diego, says, "We can do quite amazing things in terms of presenting information."

Many of the newer cells phones and PDAs have a graphics chip like the one in your PC. The chip can turn your phone into a virtual medical library, complete with stunning 3D computer graphics and medical scans.

Quinn is developing a program that will allow doctors to view a patient's medical history on mobile devices.

Cardiologist Michael Wright believes mobile medical records will not only help doctors, it will simplify things for patients. Dr. Wright, who is medical director at the LifeScore Clinic in San Diego says: "Right now your medical records are scattered here and there. You don't really have easy access to them."

With Quinn's program, medical notes and patient tests can be downloaded onto a cell phone in just minutes. "Let's say, for example, I had done a scan here and had picked up a narrowed blood vessel coming down the surface of the heart. That would be visible on this 3D model," Dr. Wright says.

All the data on a phone is stored in the memory expansion slot. In these medical phones, however, Instead of music and digital pictures, it could hold a virtual scan of the body and much more. "It really does provide a, an on going, growing medical record that they can always have with them," Dr. Wright tells DBIS.

The 3D mobile medical data program should be available within a year. Quinn's program isn't limited to medical information. He says students will be able to retrieve science and other information on their cell phones during class.

BACKGROUND: Half a billion cell phones are sold each year, and within two years most of these will be inter-connected devices and contain built-in 2D/3D graphics accelerators. Scientists may be able to use these devices to disseminate visual information and scientific data, such as real-time molecular and medical data. For developing countries in particular, the cell phone will become their first and/or primary computing device. It's high-end data visualization for the masses.

MAKING PHONES SMARTER: So-called "smartphones" relate to a single device that can take care of all your handheld computing and communications needs in a single small package, integrating digital photography, cellular communication, calendars and address books, GPS navigation, email, and even play music or games. The biggest advantage is that smartphones allow users to install, configure and run their favorite applications, creating individual, tailor-made service. In contrast, most standard cell-phone software offers only limited configurations for personalizing the device.

ABOUT GRAPHICS ACCELERATORS: A graphics accelerator is a type of video adapter that contains its own microprocessor, enabling higher performance. It has its own memory for storing graphical representations. Among other advantages, graphics accelerators free up the computer's central processing unit. The CPU can do other tasks while the graphics accelerator is processing the graphics. When computation tasks are divided in this way, it is known as "load balancing." Today, graphics accelerators are not just an enhancement, but a necessity, and are bundled automatically into mid-range and high-range computers.

GOING DIGITAL: Digital cell phones use the same radio technology as analog phones, but unlike analog signals, digital signals can be compressed and manipulated to fit more calls onto a given bandwidth. It's also why more cable companies are switching to digital to gain more channels. Using digital cell phones, three to ten digital calls can occupy the same space as a single analog call.

lijit search